vicsanjinez / wazuh-configLinks
Configurations to implement Wazuh
☆12Updated 2 years ago
Alternatives and similar repositories for wazuh-config
Users that are interested in wazuh-config are comparing it to the libraries listed below
Sorting:
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆400Updated 2 months ago
- ☆182Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆80Updated 4 months ago
- ☆218Updated last year
- ☆37Updated last year
- ☆47Updated 2 years ago
- A starter pack of resources to help you get started in Detection Engineering.☆162Updated 3 weeks ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Useful resources about phishing email analysis☆84Updated 6 months ago
- Tools for simulating threats☆191Updated last year
- MISP Playbooks☆206Updated last month
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆39Updated 4 years ago
- A list of Splunk queries that I've collected and used over time.☆85Updated 4 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 11 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 4 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆67Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆194Updated last year
- Wazuh integration TheHive☆38Updated 2 years ago
- ☆61Updated 4 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- ☆31Updated 3 years ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆293Updated last year
- ☆241Updated 6 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Hands-on projects on Static and Dynamic malware analysis with real-world tools.☆37Updated last year
- SIEM Cheat Sheet☆75Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated last month
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆110Updated 3 weeks ago